Professional Documents
Culture Documents
Which of the following activity is not considered as a Cyber Crime? Password Trafficking Trademark Counterfeiting Desktop Forgery Desktop Evulsion
Cyber criminal created virus named ______ and spread over the internet to celebrate Valentine’s Day in advance
Happy Valentine’s Day I Love You Nightman Melissa
in the year 2000
Section 80 is applied to only those offence which are defined under the ____. IT Act 2000 IT Act 2003 IPC 2000 Code of Criminal Procedure 1999
An offence is in which as accused is arrested with a warrant is called Cognizable offences Non-cognizable offences Criminal offence Punishment
An offence is in which as accused is arrested without a warrant is called Cognizable offences Non-cognizable offences Criminal offence Punishment
The word ________ are referred to situation where a person is caught in the process of commission of an offence
“having committed” “about to commit” “of committing” “being committed”
which has not yet concluded.
The word ______ are referred to a situation where the offence has been concluded “having committed” “about to commit” “of committing” “being committed”
Which of the following is not type of Hacking? Code Hackers Phreaker Cyberpunk and Crackers Mischiefer
What is full form of FIR? Fastest Investigation Report First Investigation Report First Information Report First Information Request
Which of the following is not motivation for teenagers to attract towards cyber crime? Hungry for fame and publicity Excitement for achieving some great Lack of fear Deep knowledge of Law
Definition of ‘Cheating’ is explained in ___. Section 415 Section 416 Section 417 Section 418
As per Section 43 ______ means to destroy, alter, delete, add, modify or rearrange any computer resourses by any
Hacking Cheating Virus Damage
mean.
Mischief is explained in _____ IPC 422 IPC 423 IPC 424 IPC 425
Under Section 67 of an Information Tchnology Act 2000 __ years imprisonment and fine up-to 5 lakhs is for Cyber
1 3 5 7
Pornography.
Under Section 70B of an Information Tchnology Act 2000 __ years imprisonment and or fine. 1 3 5 7
“Doctor Nuker” is known as _____ in Cyber World introduced by Pakistan. Group of Cyber Crime protectors Group of Cyber Attack protectors Group of Hackers Group of Doctors
Full form of TADA is ____. Terrorist Arrest Disruptive Act Terror Activities Disruptive Act Terrorist and Disruptive Activities Act Terrorist Activities Disruptive Act
The Cyber Appellate Tribunal shall have same power as are vested in a civil court under _______. Code of Conduct Code of Civil Procedure Indian Cyber Code Code of Civil Court
___ shall have powers to regulate its own procedure including the place at which it shall have its sitting. The Cyber Appellate Tribunal The originator The Judge The court
If any country hacks computer, computer system or network in India then ______ of IT Act is applied. Section 66 Section 77 Section 80 Section 177
Section 71 : Imprisonment up to 2 years and / or fine Section 72 : Imprisonment up to 2 years Section 72A : Imprisonment up to 2 years Section 73: Imprisonment up to 2
Select the odd (wrong) combination from the following
up to ₹ 1 Lakh and / or fine up to ₹ 1 Lakh and / or fine up to ₹ 1 Lakh years and / or fine up to ₹ 1 Lakh
Section71: Misrepresentation to the controller to the Section72: Breach of confidentiality and Section73: Disclosure of information in Section74: Publication for
Select the odd (wrong) combination from the following
certifying authority privacy breach of lawful contract fraudulent purpose
Section 68 : Imprisonment up to 2 years and fine up Section 68A : Imprisonment up to 2 Section 69: Imprisonment up to 7 years and Section 69A: Imprisonment up to
Select the odd (wrong) combination from the following
to ₹ 1 Lakh years and fine up to ₹ 1 Lakh fine 7 years and fine
Which of the following is not a type of cyber-crime? Data theft Forgery Damage to data and systems Installing antivirus for protection
Those who have knowledge of intricacies Those who have knowledge of intricacies of
Who are the code hackers? Those who have the knowledge of coding language. Who have Knowledge of internet
of computer systems and their computer systems and their operations.
operations.
In which year India’s IT Act came into existence? 2003 2001 2002 2000
Non cognizable offence is an offence in which a police-officer cannot arrest any person without Notice Warrant Authority Letter Permission
Who are not the authority for justice dispensation system for cybercrimes? Controller of Certifying Authorities Certifying Authority High Court Adjudicating Officer
Which section 0f IT Act 2000 defines punishment for hacking? 77(3) 80(1) 66(1) 90(2)
Question Option1 Option2 Option3 Option4
Which of these is not type of E-Commerce transaction? Information Access Interpersonal Communication Shopping Services Horizontal Enterprises
non-disclosure or confidentiality clause stated in employment contract sale of good act 1930 arbitary act data protection act
An e-contract is a contract modeled, specify executed and deployed by _____. software system software developer online companies e-government
________ is a person sends, generates, stores and transmits messages Addressee Originator Developer Receiver
Three main methods of contracting electronically are email, world wide web and ________ contract Soft system cyber technical
In section2(a) of Indian Contract Act _________ is defined as website advertisements are invitation Offer Contract Contact Deal
__________ Jurisdiction implies jurisdiction based upon monetary limit. Pecunairy Subject Matter Territotial Appellate
The concept of ________________ has been explained by the courts time and again. Cause of action Law Judgement Remedy
Conclusion of ________ contract is made by breaking by seal to bind Electronic Soft Shrink and wrap Click and wrap
_________ contract allow user to read the term before accepting it. Electronic Soft Shrink and wrap Click and wrap
The person making proposal is known as _____ and the person accepting it is known as ________ promisor, promise promisee, originator addressee, originator promisor, addressee
_______ may be used to specify the legal rules that will govern a contract. Governing Law Clause Limitations of Liabilities Warranties Arbitration Clause
the law of contract is stated in indian contract act 1872 sale of good act 1930 indian contract act 1972 Consumer act
The purpose of ____ is to define the material embodiment of a contract. Entire Agreement Clause Software License Agreement Confidentiality Clause Arbitration Clause
As per ________ a suit related to immovable property is needed to be instituted in the court whose jurisdiction the
CPC 1906 CPC 1907 CPC 1908 CPC 1909
property is situated
Cause of action contains the circumstances forming the infringement of the right making of meaningful laws area of jurisdiction agreement
In contract not each and every place is connected that would have jurisdiction based on the principles of ______ Cause of action Making of contract Making parties Jurisdiction of India
_______ in relation to a body corporate, means the place where it is registered. Usual place of residence Place of Jurisdiction Place of crime Any place in world
The _____ a suite for compensation for wrong to immovable property is held by the defendant. Section 16 of CPC, 1908 Section 16 of CPC, 1909 Section 32 of CPC, 1908 Section 32 of CPC, 1909
_____is complete when it comes to the knowledge of the person to whom it is made. Acceptance of contract The agreement The communication of a proposal Entire Agreement
Two or more persons are said to _______ when they agree upon the same thing in the same sense. Consent Coercion Addressee Contractor
A _____ is a contract to do or not to do something, if some event, collateral to such contract, does or does not happen. Lump Sum Contract Unit Price Contract Contingent contract Incentive Contract
There are three types of jurisdiction generally recognized in international law. Which of the following is not type of
the jurisdiction to adjudicate the jurisdiction to prescribe the jurisdiction to correct the jurisdiction to enforce
Jurisdiction?
____statute is a statute that allows for a court to obtain personal jurisdiction over an out-of-state defendant on the
A Long Arm A Legal Arm A Short Arm A Court Arm
basis of certain acts committed by an out-of-state defendant, provided that the defendant has a sufficient connection
with the state.
EULA stands for? End-User Agreement End-License Agreement End-User License Agreement End-User Loyalty Agreement
EDI stands for Electronic Data Interchange Electronic Data Intersect Electronic Domain Interchange Electronic Data Internet
Contract formation on internet determine Time and place System Contract Name
Confidentiality clause define Agreement Contract Document Seek to protect intellectual property
Question Option1 Option2 Option3 Option4
DNS stands for Domain Name System Domain Name Source Domain Name Service Domain Name Search
Unauthorized use of trademark is known as Cyber Haking Cyber-squatting Hacking Cyber Spacing
Un-authorized use of other’s trademark which may leads to trademark infringement and or passing-off is known as Meta-tagging Meta-Hacking Meta-Fixing Meta-Catching
Under the _______ burden of proving bad faith registration is not heavy. ICANN UDRP STOP NASSCOM
National Alteration of Software and Non Association of Software and National Association of System National Association of System
NASSCOM stands for
Service Companies Service Companies and Service Companies and Squatting Companies
Repeate Instrumental Association of Rework Industry Allocated of Recording Industry Association of
Trademark related Organization RIAA stands for Recording Industry Association of Africa
America America America
The remedies available for infringement of copyright does NOT include which of the following Injunction Account of profits Rectification Damages
Which of the following is not civil remedies. Intriocutory injunction Precuniary remedies Mareva injunction Criminal remedies
The 'apple' logo of the Apple Corporation is an example of which of the following Copyright Patent Design right A trade mark
IT Act-2000 stands for Information Tech Act -2000 Indian Technology Act -2000 International Technology Act -2000 Information Technology Act -2000
By the use of Napster leads to major forms of harm to Film Industry Music Industry Video Industry Digital Industry
A company wishes to ensure that no one else can use their logo. Copy rights Trade mark Patent Industrial designs
The term of copyright for an author lasts how long? The life of the author The life of the author plus 60 years 95 years 75 years
Which of following would not gain copyright protection? A DVD An unrecorded speech Written lyrics of a song A hand knitted jumper
Typological arrangements of
Napster and Its Cousins Case Related to Ideas Music and broadcasts Dramatic productions
published editions
Napster and Its Cousins has developed system is called as Peer to peer Link to link Share To Share Host to Host
Conclusion of an alternative for Napster SongsPk Digital Library Digital Songs Free Songs for All
Imprisonment upto 3 years but not less Fine which may not be less than Search and seizure of infringing Cancellation of delivery infringing
Under Copyright act , 1957 which remedies are not provided for infringement
than 6 month 50000 but may extended up to goods goods to the copy right owner
200000.
___________is a link to another website is displayed within a window or frame. Surface linking Framing Downloading Deep linking
The income which falls under the head “------------“ ,if it is earned Interest Tax Salary Spend
Digital signatures are based on -------key encryption Cypher text Hash key Private key Public Key
Digital Signature Certificate can not be suspended for a Period exceeding -----------days unless a subscriber has been
15 25 30 10
given an opportunity of being heard in the matter
The suspension of Digital Signature Certificate is required to be communicated to the subscriber by the----------- Any Sector Private Authority Certifying Authority Public authority
----------- means property of every description except immovable property Static Property Portable property Movable Property Fix property
----------- is broadly defined as payments of any kind in consideration for services of managerial technical or consultancy
FTS FTP PTS FAA
nature except the payments for independent personal services
TAG stands for ------------- Technical Advertisement Group Technical Advisory Group Technological Advisory Group Technological Advertisement Group
FTS stands for--------------- Fundamental Target service Fees for temporary Service Fundamental technique service Fees for technical service
Section 161 of the Income Tax Act,1961 defines --------- The liability of a representative assesse Recovery of tax Direct Assessment Right of representative assesse to recover tax paid
The applicant is in the course of being A receiver is not appointed by court in The controller has invoked a performance bond or A certifying authority fails to comply with the directions of the
Which one of the following is not Rule 17 of the Certifying Authorities Rules,2000
wound up the respect of applicant banker’s guarantee controller
CA stands for-----------,who issues digital certificate Certification Authority Charted Accountant Certified Application Certified Anatomy
-------- implies a smoother interface between government and citizen E-Commerce E-Governance C to C Commerce E-Media
------------ serves as an Identity of an individual for certain purpose Copy right Digital copy E-Copy Digital Signature
---------- enables publication of rule ,regulation ,order,bye- law, Section 6 of the IT Act,2000 Section 7 of the IT Act,2000 Section 9 of the IT Act,2000 Section 8 of the IT Act,2000
Which one of the following is model of tax treaties which serves as a guide for DTAAs OECD Model treaty Tug of war ACID model OPD Model
-------------------is based on ideology that developing countries are mostly net importers PE United Nations Treaty UNF Unified Law
Types of DTAA Comprehensive and Limited Open source and Unlimited Integrated and Shortened None
The encryption of hash result of the message with the private key of the sender is called------------- Cryptography Digital documentary Digital signature Public key
Land Record system PRISM is in---------- Panchgani Punjab Aasam Uttar Pradesh
------------has recognized that it is rare that an ISP would have any authority to enter into binding contract on behalf of
GIIC UN model OECD Model Treaty BNCC
customer
Which one of the following is basic principle of taxation internationally Residence base taxation Non residence taxation Destination Based Taxation Basic Transformation
A multi utility bill paying counter termed --------- FRIENDS PRISM RICH BELL
-------- as a person who has been granted a license to issue Digital Signature certificate Officer Agent Owner Certifying Authority
The IT minister Mr.Pramod Mahajan has declared the year 2001as the year of ---------- Recession Digital E-Governance Mega World
Indian income tax act was enacted in 1961 1962 1963 1964
Digital signatures created and verified using Program Graphical coding Html Cryptography
DTAA stands for Double tax agreement act Double tax avoidance agreement Double tax apply agreement Double tax application agent
Asymmetric cryptosystem is known as Public key cryptography Protected key cryptography Encryption Internal key encryption
Section 12 and 13 of IT Act 2000 signifies Proposal License Contract formation Refusal of work
Controller of Certifying Authorities(CCA) works under Prime Minister Office Reserve Bank of India Ministry of communication &IT autonomous body
He/She is in India in the previous year He/She is in India for period of 70 days or He/She is in India in the previous year for a period of He/She is in India for period of 70 days or more during the previous and
An individual is said to be resident in India if
for a period of 182 days or more more during the previous and 365 days or 180 days or more 361 days or more during the four years immediately preceding previous
more during the four years immediately year
Revocation of digital signature certificate defined in Section 38 Section
preceding 39 year
previous Section 40 Section 41
Which model is not a part of Permanent Establishment? UN model OECD model US model ISN model